deceptionsystem / master
☆15Updated 6 years ago
Alternatives and similar repositories for master:
Users that are interested in master are comparing it to the libraries listed below
- ☆16Updated 10 years ago
- This tool is used for generating Manufacture Usage Description(MUD) from Device Traffic Trace(PCAP)☆30Updated 2 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆25Updated 2 years ago
- Simulate DDoS attacks and generate traffic datasets☆51Updated 8 years ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆33Updated 11 months ago
- A simple utility to classify packets into flows. It's so simple that only one task is aimed to finish. For Deep Packet Inspection or flo…☆168Updated last year
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆112Updated 3 years ago
- Coburg Intrusion Detection Data Sets☆50Updated 7 years ago
- Network traffic classification library that requires minimal application payload☆212Updated 8 months ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆10Updated 5 months ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆222Updated 6 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Machine learning plugins for network traffic☆126Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet☆171Updated last year
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Updated last year
- An SDN based security system for Botnet based DDoS attacks.☆15Updated 9 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆49Updated 4 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Updated 6 years ago
- ☆11Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆62Updated last year
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Passive Real-time Asset Detection System☆237Updated 11 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Updated 9 years ago
- This tool can replay a pcap capture at wire speed on several 10Gbps links.☆67Updated 4 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆349Updated 2 years ago
- Simple Network Intrusion Detection System. In python with Scapy.☆37Updated 5 years ago
- Unofficial P4_16 implementation of the HashPipe heavy hitter detection algorithm proposed in the paper, "Heavy-Hitter Detection Entirely …☆19Updated 4 years ago
- Network traffic classifier based on machine learning algorithms☆43Updated 2 years ago